Attach the mounting plate Make the connections 3.2.1 Power connection 3.2.2 Network (and PoE) connection Mount the camera Camera set-up Camera positioning Focal length and focus Basic settings 4.3.1 Install menu Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 4
7.2.3 Language selection 7.2.4 Date and time 7.2.5 Time server Display Settings 7.3.1 Display stamping Encoder Settings 7.4.1 Selecting an encoder profile 7.4.2 Changing profiles 7.4.3 JPEG posting Camera settings 7.5.1 V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Alarm Settings 7.11.1 Alarm connections 7.12 7.12.1 Analysis 7.12.2 Analysis type 7.12.3 Motion detector 7.12.4 Sensitivity 7.12.5 Tamper detection 7.13 Alarm e-mail 7.13.1 Send alarm e-mail 7.13.2 Mail server IP address Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 6
Connecting with a Web browser 8.0.5 Closing the connection Operation with decoder software Maintenance 10.1 Testing the network connection 10.2 Repairs 10.2.1 Transfer and disposal Troubleshooting Specifications 12.1 Dimensions (mm/inch) 12.2 Accessories 12.2.1 Power transformers V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 7
FlexiDome IP | en 7 Glossary Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Power cord and plug protection - Protect the plug and power cord from foot traffic, being pinched by items placed upon or against them at electrical outlets, and its exit from the unit. For units intended to operate with V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 9
(rain, snow, etc.); – liquid has been spilled in or on the equipment; – an object has fallen into the unit; – unit has been dropped or the unit cabinet is damaged; Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 10
14. Attachments, changes, or modifications - Only use attach- ments/accessories specified by the manufacturer. Any change or modification of the equipment, not expressly approved by Bosch, could void the warranty or, in the case of an authorization agreement, authority to operate the equipment.
Page 11
Alerts the user to important instructions accompanying the unit. NOTICE! This symbol indicates information or a company policy that relates directly or indirectly to the safety of personnel or protection of property. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 12
Video loss Video loss is inherent to digital video recording; therefore, Bosch Security Systems cannot be held liable for any damage that results from missing video information. To minimize the risk of lost digital information, Bosch Security Systems recom- mends multiple, redundant recording systems, and a procedure to back up all analog and digital information.
Page 13
UL MAKES NO REPRESENTATIONS, WARRANTIES, OR CERTIFI- CATIONS WHATSOEVER REGARDING THE PERFORMANCE OR RELIABILITY OF ANY SECURITY OR SIGNALING RELATED FUNC- TIONS OF THIS PRODUCT. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 14
14 en | FlexiDome IP Disposal Your Bosch product was developed and manufactured with high-quality material and components that can be recycled and reused. This symbol means that electronic and electrical appli- ances, which have reached the end of their working life, must be collected and disposed of separately from household waste material.
– Event-driven, automatic connection – Convenient maintenance via uploads – Flexible control and data channel encryption – Authentication according to the 802.1x standard – NightSense extends the camera’s low-light performance. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
16 en | Introduction FlexiDome IP Type number overview Type number NWD-455V03-10P NWD-455V04-10P NWD-455V03-20P NWD-495V04-20P Lens Varifocal Varifocal Varifocal Varifocal 2.6 to 6 mm 3.7 to 12 mm 2.6 to 6 mm 3.7 to 12 mm F1.4 F1.6 F1.4 F1.6...
VIDOS, BMVS or DIBOS 8.0 – MPEG-4 compatible hardware decoder from Bosch Security Systems (such as VIP XD) as a receiver and a connected video monitor The minimum PC requirements are: – Operating platform: a PC running Windows 2000 or Win- dows XP with IE6.0...
LAN, and an additional JPEG stream for use with a PDA. 1.4.6 Recording The camera can be used with an iSCSI server connected via the network to store long-term recordings. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Clicking this icon stores the video sequences and they can be replayed with the Player from Bosch Security Systems included with the package. Bosch Security Systems Operating Instructions...
20 en | Introduction FlexiDome IP 1.4.13 Intelligent Video Motion Detection The intelligent video motion detection (iVMD) system of the camera uses advanced analysis algorithms with comprehensive functions for the detection of motion. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Remove the trim ring with dome by pulling it off of the base. Remove the inner liner by pulling it off of the base. Loosen the three Phillips captive screws until the mount- ing plate separates from the body Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Solid surface (three Mounting plate pre-drilled 8mm holes) Three screws (supplied with camera) Suspension wire Integrated camera unit and base Three screws (M5, supplied) Fig. 3.2 Surface mounting - top connection V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
To open the connection box, loosen the Phillips screws, and open the cover flips. CAUTION! Never supply power via the Ethernet connection (PoE) when power is supplied via the power connector. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Slide the connection box back into its position in the base. Push the connections back through the surface wire hole. Secure the integrated camera and base to the mounting plate with three screws. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
For horizontal adjustment (pan), rotate the camera module in the base. Do not rotate more than 360°. – For vertical adjustment (tilt), loosen thumbscrews, posi- tion camera, then gently tighten thumbscrews to secure camera. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
The camera has an Installer menu in which basic installation settings (IP address) can be accessed. Five keys, located on the side panel, are used for nav- igating through the basic set-up menu. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Use SELECT to exit the address edit screen. Subnet Mask Enter the Subnet mask (default 255.255.255.0) Gateway Enter a Gateway address. Exit Return to the Install menu Table 4.2 IP address submenu Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Place the sealing ring and the trim ring over the dome. Align the tamper-resistant screws in the trim ring with the threaded ends in the mounting base. Use the supplied special screwdriver bit to tighten the three tamper-resistant screws. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
The camera must be assigned a valid IP address to operate on your network. The default address pre-set at the factory is 192.168.0.1 Start the Web browser. Enter the IP address of the camera as the URL. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 30
NOTICE! If the connection is not established, the maximum number of possible connections may already have been reached. Depending on the device and network configuration, up to 20 web browsers, or 50 VIDOS or BVMS connections are supported. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Radius network, connect it directly to a PC via a crossed network cable and configure the two parameters, identity and password. Only after these have been configured can you communicate with the camera via the network. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
6.1.1 Processor load When accessing the camera with a browser, the processor load is displayed in the upper right of the window next to the Bosch logo. Move the mouse cursor over the icons to display numerical val- ues. This information can help with problem solving or when fine tuning the device.
Livepage can be saved on the computer's hard drive. The sequences are recorded at the resolution specified in the encoder configuration. The storage location depends on the configuration of the camera. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Click the symbol for recording video sequences again. Sav- ing is terminated. Installing Player You can play back saved video sequences using the Player from Bosch Security Systems, which can be found on the software CD supplied. NOTICE! A corresponding MPEG ActiveX (located on the CD provided with the product) must be installed on the computer in order to play back saved video sequences using the Player.
Click a partition name from the list to display the record- ings for this partition. Click a list entry. The playback for the selected sequence starts immediately in the video window. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
The date and time display below the bar provides orienta- tion to the second. You can control playback by means of the buttons below the video image. The buttons have the following functions: Start playback Pause playback V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 37
Use the bookmarks as follows: Jump to the previous bookmark Set bookmark Jump to the following bookmark – Right-click a bookmark to delete it. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 38
FlexiDome IP NOTICE! Bookmarks are only valid while you are in the Recordings page; they are not saved with the sequences. As soon as you leave the page all bookmarks are deleted. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
All unit parameters can be accessed in this mode. Changes that influence the fun- damental functioning of the unit (for example firmware updates) can only be made using the configuration menu. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 40
Clicking the Set button saves only the settings in the current window. Changes in any other fields are ignored. Click on the Settings link at the top of the window to close the window without saving the changes made. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
7.2.2 Password protection A camera is generally protected by a password to prevent unau- thorized access to the unit. You can use various authorization levels (User name:) to limit access. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 42
NOTICE! The new password is then saved by clicking the Set button. You should therefore click the Set button immediately after entering and confirming the password, even if you also want to assign a password to another user name. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Enter the current time or click Synchr. PC to apply the sys- tem time from your computer to the camera. 7.2.5 Time server The camera supports several network time server protocols and can synchronize its internal clocks with various types of time Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 44
When you are finished, click OK to save and activate the table. Time server IP address Enter the IP address of a time server. Time server type Choose the protocol used by the selected time server. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
It can be displayed at a position of your choice using the Custom option. Or it can be set to Off if no overlay of this information is to be shown. Select the desired position from the lists. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
(Dual Streaming), for which you can select different compression settings, for example one setting for transmissions to the Internet and one for LAN connections. Pre-programmed profiles are available, which each give priority to different perspectives. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 47
Various additional items of infor- mation regarding data transmission are displayed and continu- ally updated above the previews. Click on a tab to select the associated stream. Select the desired setting from the list. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
NOTICE! The parameters as a group constitute a profile and are dependent on one another. If you enter a setting outside the allowed range for a parameter, the nearest valid value is substituted when the settings are saved. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 49
2/3 D1 464 × 576/480 pixels Default Click Default to return the profile to the factory default values. Details Click Details to display further settings for image quality and communication parameters. These settings require familiarity Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 50
A value of 31 results in a very high refresh rate and lower image quality. I-frame distance This parameter determines the number of inter-coded frames between two I-frames. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
JPEG posting interval Enter the interval in seconds at which the images will be sent to an FTP server. Enter zero if you do not want any images to be sent. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
The numbering follows the labeling of the video inputs on the actual unit. Camera settings NOTICE! If the camera is in monochrome mode, all color related menu items are disabled and cannot be accessed. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Nightsense™ extends the low-light performance of the camera. – In AUTO mode, the camera automatically inches to mono- chrome in low-light conditions. – In FORCED mode, the camera remains in high-sensitivity monochrome operation. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
When ON, the video level is optimized for the center of the image. Parts outside this area may be underexposed or overex- posed (this is normal). Auto Black Autoblack ON automatically increases the visibility of details. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Offset factory white point alignment (reducing red introduces more cyan). Blue Gain Offset factory white point alignment (reducing blue introduces more yellow). NOTICE! It is only necessary to change the white point offset for special scene conditions. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Recording Manager (VRM) control all recording when accessing an iSCSI server. The VRM is an external program that configures recording tasks for video servers. For further information, con- tact your local customer service at Bosch Security Systems. V 1.0 | 2006.12 Operating Instructions...
Click Log to view a status report with logged actions. A new window opens. In this window, click Delete to delete all entries. Entries are deleted immediately; you cannot undo this process. Click Close to close the window. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Enter the IP address of the required iSCSI server here. Click Connect. The connection to the IP address is estab- lished. The iSCSI LUN map field contains the correspond- ing logical drives. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Enter the LUN of the required drive. 7.7.6 Target password If the drive is password protected, enter the password. NOTICE! You may not enter a new password. This is only possible by configuring the iSCSI storage device. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Click Log to view a status report with logged actions. A new window opens. In this window, click Delete to delete all entries. Entries are deleted immediately; you cannot undo this process. Click Close to close the window. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Click Create partition to start the wizard for creating parti- tions. The first window appears. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 62
Finish button. CAUTION! All modifications to settings are only effective if you complete the configuration in the last window by clicking Finish. Switch to the last window if necessary. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
CAUTION! Changes to a partition lead to a re-organization which results in the loss of all sequences stored on that partition. Consequently, you should back up all important sequences on the computer's hard drive before modifying the partition. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 64
In Linear mode the recording proceeds until the entire hard drive space is full. The recording is then stopped until old recordings have been deleted. Number of alarm tracks NOTICE! Alarm tracks must be set up for alarm recording. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 65
You can delete all recordings in a partition at any time. CAUTION! Check the recordings before deleting and back-up important sequences on the computer's hard drive. – Click Format! to delete all recordings in the current parti- tion. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
You can define up to ten separate recording profiles. You then assign these to individual days or times of day in the recording scheduler. Modify the names of the recording profiles on the tabs in the Recording planner page. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 67
Select the encoder profile to use for continual recording. NOTICE! The recording profile can deviate from the standard setting Active profile and is only used during an active recording. Encoder Select which data stream to record here. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 68
Select the encoder profile to use for recording during the post- alarm time. The Standard profile option sets this to the same as the standard profile. Motion detection/video alarm Select the alarm type that is to trigger a recording. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Use the right mouse button to deselect any of the intervals. Click Select all to select all of the intervals to be assigned to the selected profile. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Recording scheduler are deactivated and the configura- tion cannot be modified. You can terminate recording at any time to modify the configuration. Click Start to activate the recording schedule. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
IP address in the event of an alarm. NOTICE! Stream 2 is always transmitted for alarm connections. This should be taken into account when assigning the profile. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 72
If you select On, only encrypted ports are available for the destination port. SSL encryption must be activated and configured on both sides of a V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 73
IP addresses after each restart, connection breakdown or network failure. NOTICE! Stream 2 is always transmitted for automatic connections. This should be taken into account when assigning the profile. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
If you select Motion+ analysis, for example, the sensor fields in which movement is registered light up. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
The current alarm status is displayed for information purposes. NOTICE! Additional analysis algorithms with comprehensive functions such as IVMD are available from Bosch Security Systems. 7.12.3 Motion detector Motion detection is available for the Motion+ analysis type. For the detector to function, the following conditions must be met: –...
Page 76
Left-click the fields to be activated. Activated fields are marked red. If necessary, click Select all to select the entire video frame for monitoring. Right-click any fields you wish to deactivate. Click OK to save the configuration. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
The average brightness of the scene provides a basis for recognition. Scene too dark Activate this function if tampering associated with covering the objective (for instance, by spraying paint on it) should trigger Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 78
Click Select area to configure the sensor fields. A new win- dow will open. If necessary, click Clear all first to clear the current selec- tion (fields marked red). V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
(Simple Mail Transfer Protocol). Outgoing e-mails are sent to the mail server via the address you entered. Otherwise leave the box blank (0.0.0.0). 7.13.3 Layout You can select the data format of the alarm message. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
This makes it easier to identify the origin of the e-mail. 7.13.6 Send e-mail for testing Test the e-mail function by clicking Send now. An alarm e-mail is immediately created and sent. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Click Set after entering a new IP address. – To do this, enter the old IP address followed by / reset (for instance 192.168.0.80/reset) in the address bar of your web browser. When the camera is Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 82
The camera uses the TLS 1.0 protocol. Ensure that the browser has been configured to support this protocol. Also ensure that Java application support is activated (in the Java Plug-in Con- trol Panel of the Windows Control Panel). V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 83
1. SNMP host address / 2. SNMP host address The camera supports the SNMP V2 (Simple Network Manage- ment Protocol) for managing and monitoring network compo- Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
VIDOS or BVMS, will not find the camera. 7.14.2 Multicasting In addition to a 1:1 connection between an encoder and a sin- gle receiver (unicast), the camera can enable multiple receivers V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 85
The camera supports multi-unicast connections for up to five simultaneously connected receivers. NOTICE! Duplication of data places a heavy demand on the CPU and can lead to impairment of the image quality under certain circumstances. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Click an entry to select it (select multiple entries by hold- ing the control key while clicking). Click Clear keys to delete the keys for the marked streams. These streams are no longer encrypted. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
This window is for information only and cannot be modified. Keep this information at hand when seeking technical support. For example, you can copy the hardware and firmware version numbers to paste them into an e-mail. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Mark the check boxes for the information to be displayed on the Livepage. The selected elements are checked. Check on the Livepage whether and how the desired items are displayed. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 89
When the IVMD 2.0 algorithm is activated, object trajectories from VCA are displayed in the live video stream. Show event log The event messages are displayed with the date and time in a field next to the video image. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Livepage. – If necessary, click Search to find a suitable folder. 7.14.6 Licenses You can enter the activation key to release additional functions or software modules. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
The latest firmware can be obtained from your customer service center or from the Bosch Security Systems download area. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 92
You can save configuration data for the camera to a computer and load saved configuration data from a computer to the unit. Click Download; a dialog box appears. Follow the instructions to save the current settings. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Can the camera be called remotely? – Does the camera transmit all the data required? – Does the camera respond as desired to alarm events? – Is it possible to control peripheral devices if necessary? Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
This connection option can also be used to connect a transmit- ter and a compatible receiver using a switch connected to the alarm input. In this case, no computer is needed to establish the connection. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
In the title bar of the Monitor window on the page Connec- tions, click on the X icon to end the display of the video images on the connected monitor. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
IP video security solution that provides seamless management of digital video, audio and data across any IP net- work. It is designed to work with Bosch CCTV products as part of a total video security management system. Now you can inte- grate your existing components into one easy-to-manage sys- tem, or use Bosch’s full-line capabilities and benefit from a...
Defective or superfluous devices and parts should be disposed of profes- sionally or taken to your local collection point for hazardous materials. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
FlexiDome IP Troubleshooting If you cannot resolve a fault, please contact your supplier or system integrator or go direct to Bosch Security Systems Cus- tomer Service. The version numbers of the internal processors can be viewed on a special page. Please note this information before contact- ing Customer Service.
Page 99
LUN mapping not The iSCSI system does not Delete the identity on the iSCSI- possible. support the use of initiator parameter configuration page. identification. Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
102 en | Specifications FlexiDome IP 12.1 Dimensions (mm/inch) 40.37 42.03 1.59 1.65 22.5 12.2 Accessories Contact your Bosch representative for the latest available accessories. V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 103
Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol Internet Protocol The main protocol used on the Internet, normally in con- junction with the Transfer Control Protocol (TCP): TCP/IP Bosch Security Systems Operating Instructions V 1.0 | 2006.12...
Page 104
RADIUS is the de-facto standard for centralized authentication of dial-ins for modems, ISDN, VPN, wireless LAN (see 802.1x), and DSL. RFC 868 A protocol for synchronizing computer clocks over the Inter- V 1.0 | 2006.12 Operating Instructions Bosch Security Systems...
Page 105
Time-To-Live; life cycle of a data packet in station transfers User Datagram Protocol Uniform Resource Locator Unshielded Twisted Pair See wide area network Wide area network A long distance link used to extend or connect remotely located local area networks Bosch Security Systems Operating Instructions V 1.0 | 2006.12...